SAD622S - SYSTEMS ADMINISTRATION - 2ND OPP SUPL - JAN 2023


SAD622S - SYSTEMS ADMINISTRATION - 2ND OPP SUPL - JAN 2023



1 Page 1

▲back to top


r
nAmlBIA UnlVERSITY
OF SCIEnCE Ano TECHnOLOGY
FACULTY OF COMPUTING AND INFORMATICS
DEPARTMENT OF COMPUTER SCIENCE
QUALIFICATION:
BACHELOROF COMPUTERSCIENCE
QUALIFICATION CODE: 07BACS, 07BCCS,07BCCY,07BCMS
COURSE: SYSTEMSADMINISTRATION
DATE: JANUARY 2023
DURATION: 2 HOURS
LEVEL: 6
COURSE CODE: SAD622S
SESSION: 2
MARKS: 50
SECOND OPPORTUNITY/SUPPLEMENTARY EXAMINATION QUESTION PAPER
EXAMINER(S)
MODERATOR:
MR. SHADRECK CHITAURO
MR. SHOOPALA NAMBAHU
MS. TERESIA ANKOME
MS. ALBERTINA SHILONGO
MR. ISAAC NHAMU
THIS QUESTION PAPER CONSISTS OF 4 PAGES
(Excluding this front page)
INSTRUCTIONS
1. Answer all questions.
2. Write all your answers in the answer booklet provided and number every question.
3. Please, ensure that your writing is legible, neat and presentable.
4. Marks/scores per question are given in square brackets [ ].
5. Do not use or bring into the examination venue books, programmable calculators, mobile
devices and other material that may provide you with unfair advantage. Should you be in
possession of one right now, draw the attention of the examination officer or invigilator.
6. All things that should not be marked, e.g. any "rough work", have to be crossed out
unambiguously.

2 Page 2

▲back to top


3 Page 3

▲back to top


r
1. True or False
[10]
(a) On a newly installed domain controller there are two group policy objects by
default.
(b) You can create a user without a password using the net user command in Windows
Server 2012 domain controller.
(c) The password command in Linux is used to change/set user password.
(d) Given the url www.google.com, the top level domain will be google.com.
(e) The symbol 1> is used as an input redirection.
(f) When promoting your domain controller for the first time, the preferred DNS server
will be set to 127.0.0.1.
(g) The PTR record in DNS is found in the reverse lookup zone.
(h) To deploy non .msi software through group policy object you use the .zap file.
(i) Linux kernel is called ntldr.
(j) Ubuntu distributions use Advanced Package Tool Set and CentOS use RedHat
Package Manager.
2. Multiple Choice
i)
All Windows 64 bit applications will be installed in
a) c:\\Program Files
b) c:\\Program Files (x86)
c) c:\\Users
d) c:\\Windows\\System32
ii)
In Windows which symbol will be used to create a hidden share
a)$
b) #
c) &
d)%
iii) Which file will be used to store user details and passwords in Windows
a) SAM
b) passwd
c) shadow
d) User_Pass
iv)
In Linux users passwords are encrypted and stored in
a) /etc/users/encrypt
b) /etc/shadow
c) /etc/passwd
d) /etc/encrypt/passwd
v)
After typing winver command in Windows, if you get the following output:
Version 21H2 (OS Build 19044.2130)
21H2 means:
a) 21 Versions
b) 4 April 2019
c) 2021 second major update
d) 21 February
1

4 Page 4

▲back to top


5 Page 5

▲back to top


3. Short Questions
(a) Which term is used to refer to a malicious software which can be inserted into a
host/computer to damage or corrupt a system, replicate itself, or deny accessto
networks, systems, or services?
[1]
(b) When migrating from an old system to a new system, which method is quick and
less expensive? State one disadvantage of this method.
[2]
(c) If you are a systems administrator for a company what measures would you put in
place so that the computers within your organization are protected from computer
viruses.
[2]
(d) How does the DNS iterative lookup process work?
[2]
(e) What is a group policy object?
[2]
(f) Explain how a systems administrator use the ping command to test DNS
functionalities.
[2]
(g) What is incremental backup? State one advantage of this backup method. [3]
(h) What is meant by lockout policy and password history in Windows? Give one reason
why an administrator enables lockout policy.
[3]
2

6 Page 6

▲back to top


7 Page 7

▲back to top


4. Long Questions
(a) Analyse Diagram A below and answer the questions which follow. Diagram A is a
screen shot from a Windows 2012 DNS Server.
File Action 'flew Help
DNSManager
1 DNS
B A STATION254
A [j ForwardLookupZones
I>@i'_.jmsdcs.cs,net
1>/@cs.net!
A G ReverseLookupZones
I>ilJ10,168.192.in-addr.arpa
uI>U TrustPoints
I> ConditionalForwarders
I> GlobalLogs
Name
CJ_msdcs
;::5_sites
u_tcp
i:'.l_udp
CJDomainDnsZones
LJForestDnsZones
(sameas parentfolder)
(sameas parentfolder)
ii (sameas parentfolder)
ii station254
Win8-Client01
station240
~webserver
~webserver
~webserver
~web
(sameas parentfolder)
(sameas parentfolder)
Diagram A
Type
Data
Startof Authority(SOA)
NameServer(NS)
Host (A)
Host (A)
Host (A)
Host (A)
Host (A)
Host (A)
Host (A)
Alias(CNAME)
MailExchanger(MX)
MailExchanger(MX)
(25],station254.cs.net.h,ostmaster.ci
station254.cs.net.
192.168.10.254
192.168.10.254
192.168.10.11
192.168.10.240
192.168.10,200
192.168.10.201
192.168.10.202
station240,cs,net
[5] station240.cs.net
[10] station254.cs.net
(i) CNAME is an acronym for?
[1]
(ii) How many changes were made in the forward lookup zone?
[2]
(iii) From Diagram A above we can see that there are 3 IP addresses associated with the
host webserver. Assuming that the company's website is hosted on webserver. Which
server will respond if clients access the webserver via the preferred browser? Hence
state the advantage of having one name associated with 3 IP addresses.
[4)
(iv) You have been hired as email server specialist. The client indicated that emails are going
to one server only. The client told you that they want emails to be replicated to all email
servers indicated in diagram A.
(a) How many email server records are shown from diagram A?
[1]
3

8 Page 8

▲back to top


9 Page 9

▲back to top


(b) Which server is the preferred email server?
[1]
(c) How do you make sure that emails will be replicated on all email servers? [2]
(v) If the client machine accessesthe url: http://web, what is the name of the machine
with the resources which will be displayed?
[2]
5. Linux Commands/Linux
(i) Write down the command to display the calendar for February 2023
[2]
(ii) Explain the following command:
cat
sad.txt
I head -50 I tail
-25
[2]
(iii) What will be the problem of entering the following command in Linux:
[1]
useradd -g 100 james -p Pa$$wOrd
*** End of question paper***
4

10 Page 10

▲back to top


2022··W- 'l <l
fl\\CUi.TV0:-' '
01:f:lf.l~T'-